Which statement is true when comparing AES encryption to Triple DES (3DES)?
Give this one a try later!
AES requires less CPU utilization and uses a larger block size than 3DES.
Which cloud feature is used to prevent data loss and provide for data retrieval in the
event of a disaster?
,Give this one a try later!
Data backups and archives
An employee that does not want to miss emails from important clients sets up her
cellular smartphone to allow her to check email. Unfortunately, she does not install
antivirus software on the cellular phone.
What type of vulnerability is represented?
Give this one a try later!
BYOD/Mobile
What is the definition of vulnerability, in computer security?
Give this one a try later!
It is a weakness which can be exploited by a threat, such as an attacker, to
perform unauthorized actions within a computer system.
Which protocol suite performs functions of OSI layer 4?
Give this one a try later!
TCP
, Which cloud service provides hardware, operating systems, and web servers but not
end-user applications?
Give this one a try later!
PaaS
Which network type is used to wire multiple PCs to a home router?
Give this one a try later!
LAN
A company has the policy that all new user passwords are P@ssw0rd but does not
require new users to change their password. An employee randomly tries a
coworker's account with the new user password to see if they can log in as the
coworker.
Which type of vulnerability does this create?
Give this one a try later!
Default password
An attacker plans to exploit flaws in an operating system to gain access to a user's
computer system.
Give this one a try later!
AES requires less CPU utilization and uses a larger block size than 3DES.
Which cloud feature is used to prevent data loss and provide for data retrieval in the
event of a disaster?
,Give this one a try later!
Data backups and archives
An employee that does not want to miss emails from important clients sets up her
cellular smartphone to allow her to check email. Unfortunately, she does not install
antivirus software on the cellular phone.
What type of vulnerability is represented?
Give this one a try later!
BYOD/Mobile
What is the definition of vulnerability, in computer security?
Give this one a try later!
It is a weakness which can be exploited by a threat, such as an attacker, to
perform unauthorized actions within a computer system.
Which protocol suite performs functions of OSI layer 4?
Give this one a try later!
TCP
, Which cloud service provides hardware, operating systems, and web servers but not
end-user applications?
Give this one a try later!
PaaS
Which network type is used to wire multiple PCs to a home router?
Give this one a try later!
LAN
A company has the policy that all new user passwords are P@ssw0rd but does not
require new users to change their password. An employee randomly tries a
coworker's account with the new user password to see if they can log in as the
coworker.
Which type of vulnerability does this create?
Give this one a try later!
Default password
An attacker plans to exploit flaws in an operating system to gain access to a user's
computer system.